Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Using New Matrix Push C2 to Deliver Malware and Phishing Attacks via Web Browser

Posted on November 21, 2025November 22, 2025 By CWS

A brand new command-and-control platform known as Matrix Push C2 has emerged as a critical menace to net customers throughout all working techniques.

This browser-based assault framework turns legit net browser options right into a weapon for delivering malware and phishing assaults.

Not like conventional malware that requires file downloads, Matrix Push C2 operates silently by way of a fileless assault technique, making it more durable to detect and cease.

The platform exploits net push notifications, a regular characteristic in trendy browsers, to determine direct communication channels with contaminated units.

Attackers use this connection to ship pretend system alerts, redirect customers to malicious web sites, monitor sufferer exercise in actual time, and even scan for cryptocurrency wallets.

The great thing about this assault from the cybercriminal’s perspective is that it bypasses many conventional safety instruments as a result of it seems to return from the browser itself somewhat than exterior malware.

Blackfog safety analysts recognized the malware’s subtle method to sufferer concentrating on and engagement.

The Matrix Push C2 dashboard offers attackers with detailed analytics exhibiting contaminated browsers, notification supply charges, and person interplay knowledge.

Matrix Push C2 marketing campaign dashboard (Supply – Blackfog)

With simply three check purchasers, the researchers noticed a one hundred pc supply success charge, demonstrating how efficient this assault vector might be at scale.

How the An infection Mechanism Works

The assault begins with social engineering. Attackers trick customers into permitting browser notifications by way of malicious or compromised web sites.

As soon as a person subscribes to those notifications, the attacker positive aspects a direct communication line to the sufferer’s desktop or cell gadget.

From that time ahead, the attacker can push out convincing pretend error messages and safety alerts that appear to be they arrive from trusted firms or the working system itself.

When customers click on these misleading notifications, they’re redirected to attacker-controlled web sites internet hosting phishing pages or malware downloads.

For instance, a pretend notification would possibly show “Replace required! Please replace Google Chrome to keep away from knowledge loss!” and direct customers to obtain trojanized software program.

The complete assault occurs by way of the browser’s notification system with out requiring conventional malware set up.

Cloudflare-style phishing notification instance (Supply – Blackfog)

What makes Matrix Push C2 notably harmful is its use of brand-themed phishing templates. The platform consists of pre-built templates mimicking PayPal, Netflix, Cloudflare, MetaMask, and different trusted providers.

Attackers can customise these templates to match official designs completely, exploiting person belief in acknowledged manufacturers.

Actual-time monitoring capabilities enable attackers to trace which notifications had been delivered, which customers clicked them, and collect useful gadget info, creating an entire assault orchestration platform.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attacks, Browser, Deliver, Hackers, Malware, Matrix, Phishing, Push, Web

Post navigation

Previous Post: Operation DreamJob Attacking Manufacturing Industries Using Job-related WhatsApp Web Message
Next Post: North Korean Kimsuky and Lazarus Join Forces to Exploit Zero-Day Vulnerabilities Targeting Critical Sectors Worldwide

Related Posts

Critical SAP NetWeaver Vulnerability Let Attackers Execute Arbitrary Code And Compromise System Cyber Security News
Printer Company Offered Malicious Drivers Infected With XRed Malware Cyber Security News
Linux Kernel Patching: Preventing Exploits in 2025 Cyber Security News
Microsoft Teams RCE Vulnerability Let Attackers Read, Write and Delete Messages Cyber Security News
Red Bull-Themed Phishing Attacks Steal Job Seekers Login Credentials Cyber Security News
Pixie Dust Wi-Fi Attack Exploits Routers WPS to Obtain PIN and Connect With Wireless Network Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • CrowdStrike Insider Helped Hackers Falsely Claim System Breach
  • New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • CrowdStrike Insider Helped Hackers Falsely Claim System Breach
  • New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark